This can be used to further publish a malicious eBook on the store which after downloading onto a user device could have helped devices to be turned into, "bots or their private local networks could be compromised, and perhaps even information in their billing accounts can be stolen."